[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: architecture draft
At 11:42 PM 4/05/2004, Iljitsch van Beijnum wrote:
Hi,
Some comments on the architecture draft.
"This implies that if a local multi-homed-aware host
establishes an application session with the remote host using "Path
a", and this path fails, the application session should be mapped
across to "Path b" without requiring any application-visible
re-establishment of the session."
This is only the first multihoming issue. The other is that it should be
possible to set up new sessions.
good point - I'll add words
"RFC 3582 [RFC3582] documents some requirements that a multi-homing
approach should attempt to address."
I think we decided against using the R-word but rather call them "goals".
Unless someone objects to this word change I'll agree to this.
"Within the constraints of current routing
and forwarding technologies it is not clearly evident that this
approach can scale to encompass a population of multi-homed sites of
the order of 10**7 such sites."
Why this specific number?
It was a number larger than any claim I've heard from a vendor to date,
and it was a power of 10. (I've heard numbers of the scale of 10**6, not
verified of course)
"While the destination address is that of R, what
source address should the local host use? There are two implications
for this choice. Firstly the remote host will, by default use this
source address as the destination address in its response, and hence
this choice of source address will direct the reverse path from R to
the local host."
While I agree that doing this sounds reasonable, there is no requirement
that this should be the case.
well, in the figure 1 model the remote host is not multi-homed, but would
need to
be multi-home "aware", and I believe the "by default" comment is correct.
"Secondly, the ISPs A and B may be using reverse
unicast address filtering on source addresses of packets passed to
the ISP, as a means of prevention of source address spoofing."
The idea is that ISPs filter. Whether they use uRPF or some other way to
accomplish the same result isn't all that interesting.
In this case the description of the practice and the use of a reference
to an approach to doing this I though was the most concise way of describing
the practice.
"As an alternative to insertion of a new protocol stack element into
the protocol architecture, an alternative approach is to modify an
existing protocol stack element to include the functionality
performed by the EIP element. This modification could be undertaken
within the transport protocol stack element, or within the
internetworking stack element."
Is there really a difference between having a wedge between the transport
and network layers and implementing the functionality in the "upper part"
of the IP protocol?
I believe so. As I said at the Seoul meeting a "new" protocol stack element
implies a distinct synchronization across to its peer. I know that there
was some
discussion in the WG on this, but I did not sense that this proposition was
not accepted by the workling group.
"As a part of the EIP function is to transform the ULP PDU to include
locator information there is an associated requirement to ensure that
the EIP peering state remains synchronized to the exchange of ULP
PDUs, so that the remote EIP can correctly recognize the locator to
endpoint mapping for each active session."
Depending on the meaning of the word "synchronize", I don't agree here.
This is very different from, say, TCP, where a three way handshake is
essential to synchronize the state at both ends. There is no reason such
tight synchronization is needed to provide multihoming functionality. If
such tight state synchronization is mandated, this leads to delays in the
actual communication because this can only start after the synchronization
is done. I don't think this is necessary.
I think we are talking at cross purposes. The words are intended to say that
you should signal a new locator to the other end if you want the other end
to recognise the locator packet as part of an active session. That does not
mean you have to sync locators at transport startup, but it does say "signal
intentions before use".
In this list:
o Transport Layer Triggers
o Routing Triggers
o Heartbeat Triggers
I'm missing ICMP triggers.
so I'll add these triggers to the list - thanks.
"One confusing question about the direction of this work is why
SCTP is being discussed as a "solution" to site multihoming,
when a clear requirement for a site multihoming solutions is
the ability to support existing TCP-based and UDP-based
applications."
A cool aspect of SCTP is that it can both function in a way very similar
to TCP and in a way very similar to UDP. It should be possible to create
an adaption layer so that applications that expect to use TCP or UDP are
redirected over SCTP.
perhaps you could suggest some alternative words here?
Some stuff I missed in the draft:
* multiaddressing by its ver nature means changes at both ends, which
is far from helpful in gettting things off the ground
agreed - again are there some general words you can propose to help me here?
* the implications of keeping the current socket API or ditching it
I'll propose that this is out of scope to this draft, being tactical rather
than architectural,
and such issues should be in Eliot's draft, but if you believe that this is
useful in this
architectural-oriented document some further explanation as to why would be
helpful.
* the application of MIPv6 mechanisms or MIPv6 lessons for multi6
hmmm - this was discussed at the meeting in Seoul, but the impression I
gained from the
conversation was that the lesson was a case of maybe the MIPv6 approach was not
directly applicable. But again if you have wrds to propose here I would
appreciate
your assistance.
Also, security should be considered from the start. We've already seen
that many things that seem like good ideas can't work securely at all, or
need so much additional security stuff that the advantages or the original
approach are largely lost.
I agree with you - and indeed think that its just so critical that it
needs its own document
in its own right to explore the space and do it justice. That's the pointer
in the draft in the
Security Considerations section.
thanks for your careful review, and please consider the invitations to
contribute
some further words to the document as noted- I'd appreciate your
assistance, of course.
regards,
Geoff